Smart Homes Cyberthreats Identification Based on Interactive Training
|
|
- Dulcie Hutchinson
- 8 years ago
- Views:
Transcription
1 Smart Homes Cyberthreats Identification Based on Interactive Training Zlatogor Minchev 1, Luben Boyanov 2 Institute of Information and Communication Technologies, Bulgarian Academy of Sciences Acad. Georgi Bonchev Str., Bl. 25A, zlatogor@bas.bg 1, lb@acad.bg 2 Abstract. The paper briefly describes cyber threats identification framework in a smart home test bed environment. A problem space is initially built, through a q-based survey of potential cyber threats sources. Further on, an expert based reference with morphological and system modelling and analysis of this space is performed via a specialized software environment I-SCIP-MA-SA. The validation is organized through an interactive human-machine agent based constructive simulation. Selected users and environment characteristics are monitored for the proposed identified threats validation. This assures an explanatory cyber threats identification combined with real test bed experiments through interactive training. Key words. cyber threats, smart homes, morphological and system analysis, agent based simulation, constructive simulation, interactive training. 1. Introduction Today smart homes are becoming an indispensible modern part of our everyday live. This concept has gone through a significant evolution for almost a century and nowadays is addressing telemedicine, security and emergency areas, green energy and emerging technologies. This is also a result of the current fast ICT progress and opens a number of threats for the technologies development perspectives and their users response. The modern IT world is a place where the interactiveness between technologies and humans is constantly evolving, mixing physical and digital realities. Humans are becoming more and more significant, with special attention paid to the behaviour dynamics and ambient factors influence. This could be a useful information source in the analysis of cyber threats for smart homes. The paper briefly considers a methodological framework for identifying cyber threats on the basis of experts believes, filtered with morphological and system analysis. The results are further experimentally validated in a test bed environment for a selected scenario sets. The process is organized around a multi-agent constructive simulation concept with humanin-the-loop participation. During this, the activities of the test bed inhabitants (smart homes users) and environment conditions are monitored for experimental correlation of selected scenarios sets. This useful combination is producing a promising base for empirical validation of experts believes through interactive training and constructive simulation. Further on, the paper gives a more detailed description of the proposed idea. 2. Methodological Framework Generally, the methodological framework for cyber threats identification (see Figure 1) encompasses the application of the scenario method combined with analysis and
2 validation. Both implementing experts believes and real human-in-the-loop monitored participation through agent based constructive simulation. Figure 1. General schematic representation of the methodological framework. The methodological framework, presented on Figure 1 could be practically implemented for smart homes cyber threats identification in four stages: (i) cyber threats identification, (ii) context definition, (iii) analysis and (iv) validation [11]. The next section gives more details of this four stages practical implementation. 3. Practical Implementation Cyber threats identification was performed collecting users focus group data gathered from two q-based surveys. The first survey concerned Web technologies trends for a five years time horizon and expected cyber threats in several social facets (Civil Society, Banks and Finances, State Governance, Critical Infrastructure, Emerging Technologies, Education). A focus group of 150 participants (national and international experts) has been studied [11]. The second survey results were produced from 250 participants focus group at the University of National & World Economy Sofia, The College of Tele and Post and VISENSI Ltd. The obtained trends were covering: Type of used smart devices ; Activities for using smart devices ; Positives of using smart devices with Internet access ; Negatives of using smart devices with Internet access ; Type of information exchanged via smart devices ; Smart devices influence to everyday life. A generalization of the obtained results from both surveys is presented in Figure 2 and Figure 3.
3 Figure 2. Q-based survey results about Web technologies trends amongst 150 participants. Figure 3. Q-based survey generalized results of smart devices amongst 250 participants. The notations from Figure 2 [11] are using a discrete five-level color scale from green to red trough yellow that shows an increasing influence towards red and a decreasing one towards green. The blue color is noting uncertainty. Similarly to another recent EU study, the selected time horizon was five years [1]. Briefly, the resulting trends are marking cyber risks and threats importance increase in all Web 1.0/Web 5.0 technological areas. A visible exception of the part concerning Web
4 4.0/Web 5.0 (for Banks and Finances and Emerging Technologies facets) is quite understandable as these new technologies are expected to be available in at least ten-year time horizon. The generalized results from Figure 3 demonstrate that most of studied the users are relying on Smartphones (70%) and Laptops (80%) for Communication (90%) and Entertainment (30%). A few of them are using smart devices for House hold support (30%), including: automated washing machines, drying machines, cleaning and cooking robots, dishwashers. Only 10 % from the users are having Smart TVs and Gamming consoles. According to the studied users focus group, the positives of smart devices usage are related to: Communication facilitation (70%) and Time saving (40%). The creation of New contacts is 30% of the users priorities. The negatives are given to Overweight (80%) and Stress (20%). Mobile smart devices are most often used for text messages exchange (70%) and multimedia (20%). Currently the influence of smart devices influence to our everyday lives is classified as Moderate (80%) up to High (60%). The percentages sum is over a hundred, as the participants were allowed to give more than one answer. Context definition is the second stage following cyber threats identification. Graphically, it is summarized in Figure 4: Figure 4. Graphical interpretation of the context definition process. The identified cyber threats are arranged in accordance with their importance using experts opinion. The results are implemented as driving factors [13] for the morphological and system analysis during scenarios preparation (see next stage). A good comprehensive example is the recent SysSec consortium study [7]. The authors mark three basic directions: mobile devices, social networks, critical infrastructure. A classification regarding smart homes environment, presented in Table 1 was proposed by the authors [2].
5 SMART HOME SERVICES POSSIBLE THREATS CRITICAL ATTACK POINTS POSSIBLE CONSEQUENCES FROM THE ATTACK Health care Do not take medicine, pacemaker malfunctioning, etc. Critical Care for children or people with disabilities Requires attention Critical Security and safety Intrusion Critical Care for children or people with disabilities Requires attention Critical Home environment Fire, flooding, gas leakage Critical Smart home appliance Does not turn off, turns on/off at wrong time integrating system Non-critical, but dangerous Privacy Violation of privacy, data gathering Video surveillance, Non-critical but dangerous Entertainment and pleasure Malfunctioning of the pleasure, comfort and entertainment systems Sensors, communication system, integrating system Non-critical Table 1. Services, dangers, attack points and consequences in smart homes. The results from Table1 are practically used during the analysis and validation methodological stage. The Analysis is performed in four sub stages. As far as the scenario method has been selected for methodological base, morphological and system analyses are initially performed.
6 Generally, these processes are relying on experts data with a lot of combinations and uncertainties, so some software support with I-SCIP-MA-SA [8] is also implemented. The key idea for machine interpretation of the problem space is the E-R paradigm [3] graphically represented with named round rectangles (Entities) and weighted headed arrows (Relations). Morphological analysis A resulting problem space for smart homes cyber threats scenarios exploration through morphological analysis with 16 alternatives spread in 5 dimensions [9] is shown on Figure 5. The dimensions are presented in different colors. Figure 5. A screen shot of I-SCIP-MA for morphological scenario problem space with 16 alternatives and 5 dimensions, studying smart homes cyber threats. The resulting cross-consistency matrix contains N = 1620 (N = 5 x 3 x 4 x 3 x 3 x 3) scenario combinations (see Figure 6). It is important to note here, that the implemented scale for weighting the arrows gives the percentage measure, covering three levels: weak [0-30%], moderate [30-50%], high [50-10%] from the interval [0, 1]. The Dimensions part is encompassing the following: Devices, Activities, Communication Medium, Environment Characteristics, Human Factor Characteristics. Each dimension contains different number of alternatives that in practice are subspaces, e.g. Devices encompasses: Mobile Smart Devices, Home Entertainment Systems and Home Automation Systems. A ranking, using Relative Common Weight (RCW) has been performed. RCW sums the unidirectional relations weights (noted with yellow labels above the relations) connecting an alternative from each of the five dimensions that were used. The final results are scenarios with negative or positive RCW in accordance with obvious or hidden cyber threats identification. The most interesting scenario combinations in our morphological analysis were: Scenario 3 (RCW = 265, encompassing: Home Entertainment Systems Entertainment Cable Networks Structural environment characteristics Spacial human factor characteristics); Scenario 9 (RCW = 210, encompassing: Mobile Smart Devices Communication Wireless Networks Physical environment characteristics Bioelectric human factor characteristics) and Scenario 19 (RCW = 110, encompassing:
7 Mobile Smart Devices Everyday Work Wireless Networks Functional environment characteristics Bioelectric human factor characteristics). Figure 6. A screen shot from I-SCIP-MA of morphological cross-consistency matrix with N = 1620 scenario combinations for smart homes cyber threats exploration. These results do not give any concrete cyber threats identification scenarios but just outline, in accordance with the experts believes, the importance of the activities Entertainment, Communication and Everyday Work together with the human factor Spacial and Bioelectric characteristics in smart home environment. System Analysis Generally, the system analysis for a smart home is a complex dynamic system approximation. The system model for smart homes could be both static [2] and dynamic. Whilst, the static one gives general classification of the objects of interest, the dynamic is quite useful in the Validation process. It is important to note that the E-R paradigm is used implementing weights (with similar to the morphological analysis scale) and time of the bidirectional relations (both noted, consecutively with labels in yellow and blue). Additionally, a three dimensional Sensitivity Diagram (SD) presenting influence (x), dependence, (y) and sensitivity (z). Four sectors encompassing the entities classification are utilized: green (buffering), red (active), blue (passive) and yellow (critical). All entities from the model are visualized in SD with indexed balls. Practical illustration of a static smart home general system model and a resulting SD classification are given in Figure 7.
8 Figure 7. A smart home system model (left) and resulting SD diagram (right) after [2]. The resulting SD from Figure 7 gives a profitable classification for further analysis, outlining the Human Factor (indexed ball/sphere 2 with coordinates {x=70, y=65, z=5}) as a critical entity together with the potential hidden cyber threats passive entities: Devices (indexed ball 5 with coordinates {x=20, y=55, z = -35}), Activities (indexed ball 3 with coordinates {x=30, y=65, z= -35}) and real active one: Communication Medium (indexed ball 1 with coordinates {x=80, y=20, z=60}). Further Validation was performed trying to obtain more comprehensive evidence for this experts believes and analyses results. Validation This final stage of the presented methodological framework is related to interactive training and includes agent-based modeling and simulation. The presented multi-agent model, implemented in I-SCIP-SA dynamic environment (see Figure 8) is encompassing seven key role agents: Real Human Agent, Entertaining Agent, Comms Agent, Storing Agent, Monitoring Agent, Digital Assistant, Attack Agent. Generally these roles cover a number of devices, protocols and parameters. What is important to note here is the capability for connecting real devices with simulated ones, i.e. mixing the virtual and real world. Additionally, Figure 8 illustrates the initial believs evolution, starting from green and progressing towards different SD sectors in accordance with model relations weights dynamics. As the human factor in this dynamic model (noted with indexed 2 sphere) is classified as a passive one (blue sector of SD on Figure 8) a more detailed analisys could be performed trough a test bed interactive environment. For this purpose, a smart home test bed environment (see Figure 9) has been organized in the framework of DFNI T01/4 project at the Institute of Information and Communication Technologies (IICT), Bulgarian Academy of Sciences BAS. The test bed environment is positioned in a room equipped with a number of smart devices, including: 3D TV/monitors, X-box game console, entertainment and cleaning robots, programmed tablet remote control and IP video omnidirectional monitoring system. An ad-hoc created digital assistant - Alex, provides voice control for lighting, multimedia and heating with holo-like projection avatar. In addition, an environment embedded Xbee sensor barometer system and wearable human factor bio headband are being developed [4]. The sensor barometer system is also capable to monitor CO/CO2 concentration measurement, radiation, electromagnetic fields and dust particles [5].
9 Figure 8. Basic multi-agent system model representation with 5 steps dynamics. The human factor activities are monitored via EEG Nation 7128W C20, bio headband for ECG and body temperature monitoring [4]. All data from sensors and video behavior monitoring is stored in a data base. Figure 9. Moments of smart home test bed validation usage at IICT-BAS.
10 The above described test bed has been organized for practical agent-based interactive training. Some interesting results have been recently published [12] concerning the human factor hidden threats related to EEG dynamics in 2D and 3D visual environment and the gamming process in social networks. The results directly accentuate the necessity of comprehensive study of cyber threats problem in smart homes and the emerging digital drugs [6]. We are planning further improvement of the validation process with other users behavioural modalities. The results will be evaluated via multicriteria analysis and balanced score card [10]. Discussion The progress in smart homes technologies is opening a number of cyber threats to their users today. Whilst some of them are quite obvious, other related to entertainment, privacy and appliances are hiding a lot of unexplored domains. Examples for such new cyber threat areas are the digital drugs (addiction to technologies) and social engineering that are important for the future generations of inhabitants (users) of smart homes. A suitable framework approach for studying these problems is the combination of experts believes data, analysis, modelling, inhabitants and environment monitoring, as well as, practical validation through real constructive experimental training. Acknowledgement The results in this publication are financially supported by: A Feasibility Study on Cyber Threats Identification and their Relationship with Users Behavioural Dynamics in Future Smart Homes, Research Grant Funding of Fundamental & Applied Scientific Research in Priority Fields, Bulgarian Science Fund, Ministry of Education Youth and Science, , DFNI-Т01/4, A special gratitude for the threats identification methodology is also given to: EU Network of Excellence in Managing Threats and Vulnerabilities for the Future Internet SysSec, FP7 Grant Agreement No , , References 1. Balzarotti, D. Second Report on Threats on the Future Internet and Research Roadmap, SysSec Consortium Deliverable D4.2, September, 2012, [Online] 2. Boyanov, L., Minchev, Z. Cyber security Challenges in Smart Homes, In Proceedings of NATO ARW Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework, Ohrid, Macedonia, June 10-12, 2013 (in press) 3. Chen, P. The Entity-Relationship Model-Toward a Unified View of Data, ACM Transactions on Database Systems, 1, no.1, 9 36, Georgiev, S., Minchev, Z. An Evolutionary Prototyping for Smart Home Inhabitants Wearable Biomonitoring, In Proceedings of Conjoint Scientific Seminar Modelling & Control of Information Processes, IMI-BAS, 21 31,`November 19, Georgiev, S., Kolev, H., Obreshkov, N., Lalev, E. Security System for Future Smart Homes, In Proceedings of National conference with international participation in realization of the EU project Development of Tools Needed to Coordinate Inter-sectorial Power and Transport CIP Activities at a Situation of Multilateral Terrorist Threat. Increase of the Capacity of Key CIP Objects in Bulgaria, at Grand Hotel Sofia, Sofia city, Bulgaria, June 4, , 2013 (in Bulgarian).
11 6. Guma, G. Messing with Our Minds: Psychiatric Drugs, Cyberspace and Digital Indoctrination, Global Research, November 11, 2013, [Online] 7. Markatos, E., and Balzarotti, D. (Eds) The Red Book. The SysSec Roadmap for Systems Security Research, The SysSec Consortium, 2013, [Online] 8. Minchev, Z., Shalamanov, V., Scenario Generation and Assessment Framework Solution in Support of the Comprehensive Approach, In Proceedings of SAS-081 Symposium on Analytical Support to Defence Transformation, RTO-MP-SAS-081, Sofia, Boyana, April 26 28, , 2010, MINCHEV-SHALAMANOV.pdf [Online] 9. Minchev, Z., Boyanov, L., & Georgiev, S. Security of Future Smart Homes. Cyber-Physical Threats Identification Perspectives, In Proceedings of National conference with international participation in realization of the EU project 'Development of Tools Needed to Coordinate Inter-sectorial Power and Transport CIP Activities at a Situation of Multilateral Terrorist Threat. Increase of the Capacity of Key CIP Objects in Bulgaria', Grand Hotel 'Sofia', Sofia, Bulgaria, , June 4, Minchev et al., Joint Training Simulation and Analysis Center, Technical Report, Institute for Parallel Processing, Bulgarian Academy of Sciences, 2009, [Online]. 11. Minchev, Z. Security of Digital Society. Technological Perspectives and Challenges, In Proceedings of Jubilee International Scientific Conference Ten Years Security Education in New Bulgarian University: Position and Perspectives for the Education in a Dynamic and Hardly Predicted Environment Sofia, Planeta -3 Publishing House, , 2013 (in Bulgarian) 12. Minchev, Z. 2D vs 3D Visualization & Social Networks Entertainment Games. A Human Factor Response Case Study, In Proceedings of 12th International Conference, ICEC 2013, São Paulo, Brazil, October 16-18, 2013 (Editors: Junia C. Anacleto, Esteban W. G. Clua, Flavio S. Correa da Silva, Sidney Fels, Hyun S. Yang), Lecture Notes in Computer Science, vol. 8215, , 2013b. 13. Schwartz, P. The Art of the Long View: Planning for the Future in an Uncertain World, Doubleday Currency, New York, 1991.
INFORMATION PROCESSES AND THREATS IN SOCIAL NETWORKS. A CASE STUDY. Bulgarian Academy of Sciences zlatogor@bas.bg, mg@acad.bg
INFORMATION PROCESSES AND THREATS IN SOCIAL NETWORKS. A CASE STUDY. Zlatogor Minchev 1,2, Maria Petkova 1 1 Institute of Information and Communication Technologies 2 Institute of Mathematics and Informatics
More informationCyber threats optimization for e-government services
Cyber threats optimization for e-government services Veselin Politov, Zlatogor Minchev, Pablo Crotti, Doychin Boyadzhiev, Marusia Bojkova, Plamen Mateev Problem Definition A discrete model of e-government
More informationThe Great Complexity of the World Around Us
Sofia, Bulgaria University of National & World Economy, NRS Department March 22, 2012 The Great Complexity of the World Around Us Building Context The Scenario Method Some Practical Examples Selected References
More informationBusiness Intelligence Systems for Analyzing University Students Data
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 1 Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2015-0009 Business Intelligence Systems
More informationSummer projects for Dept. of IT students in the summer 2015
Summer projects for Dept. of IT students in the summer 2015 Here are 7 possible summer project topics for students. If you are interested in any of them, contact the person associated with the project
More informationCommunication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar
Communication and Embedded Systems: Towards a Smart Grid Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Alex Sprintson Smart grid communication Key enabling technology Collecting data Control
More informationARCHITECTURE DESIGN OF SECURITY SYSTEM
Trakia Journal of Sciences, Vol. 8, No. 3, pp 77-82, 2010 Copyright 2009 Trakia University Available online at: http://www.uni-sz.bg ISSN 1313-7050 (print) ISSN 1313-3551 (online) Review ARCHITECTURE DESIGN
More informationConcept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
More informationChapter 4. The sleep and activities of daily living (ADL) monitoring application
Authors: Yuchen-Huang (2014-07-30); recommended: Yeh-Liang Hsu(2014-08-01). Chapter 4. The sleep and activities of daily living (ADL) monitoring application Long-term ADL profiles of the older adults acquired
More informationConnected Intelligence and the 21 st Century Digital Enterprise
Connected Intelligence and the 21 st Century Digital Enterprise Lewis Carr Senior Director, HP Software May 25 th, 2015 By 2025 we will become a deeply connected, digital world Digital everything everywhere,
More informationNow and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor
Now and Tomorrow IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor Hacktivism Regulatory/Compliance (local and international) Sophisticated Malware Data leakage Cybercriminal syndicates
More informationHow an existing telecommunications network can support the deployment of smart meters in a water utility?
How an existing telecommunications network can support the deployment of smart meters in a water utility? Samuel de Barros Moraes Centro Paula Souza São Paulo Brazil samuel.moraes@ngdc.com.br Profª Drª
More informationProfessor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia
Professor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia As of today, the issue of Big Data processing is still of high importance. Data flow is increasingly growing. Processing methods
More informationTowards an On board Personal Data Mining Framework For P4 Medicine
Towards an On board Personal Data Mining Framework For P4 Medicine Dr. Mohamed Boukhebouze Deputy Department Manager, CETIC European Data Forum 2015, November 16 17 Luxembourg Centre d Excellence en Technologiesde
More informationIndustrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
More informationAPPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION
18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK
More informationSMART HOME A DEFINITION
Housing LIN intro factsheet SMART HOME A DEFINITION Introduction and acknowledgements The concept of Smart Homes plays an important role in the planning of future housing-based models of care. Smart Homes
More informationDigital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
More informationThe Internet of the future: What could it be and what are the challenges
The Internet of the future: What could it be and what are the challenges Daniel Kofman Prof. at Telecom ParisTech CTO RAD Data Communications 1st Japan EU Symposium on the "New Generation Network" and
More informationICT Perspectives on Big Data: Well Sorted Materials
ICT Perspectives on Big Data: Well Sorted Materials 3 March 2015 Contents Introduction 1 Dendrogram 2 Tree Map 3 Heat Map 4 Raw Group Data 5 For an online, interactive version of the visualisations in
More informationThe Internet of Things (IoT) Opportunities and Risks
Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance
More informationThe Internet of Things From a User Perspective: Enhancing user experience in networks with multiple devices
The Internet of Things From a User Perspective: Enhancing user experience in networks with multiple devices Helena Holmström Olsson Malmö University Helena Holmström Olsson About me: Professor, Computer
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationCYBER SECURITY. Novel Approaches for Security in Building Automation Systems. J. Kaur, C. Herdin, J. Tonejc, S. Wendzel, M. Meier, and S.
Novel Approaches for Security in Building Automation Systems J. Kaur, C. Herdin, J. Tonejc, S. Wendzel, M. Meier, and S. Szlósarczyk jaspreet.kaur@fkie.fraunhofer.de CYBER SECURITY Outline n Building Automation
More informationInnovation value pools for Utilities or Advanced Information and Communications (ICT) Technology in Energy
Innovation value pools for Utilities or Advanced Information and Communications (ICT) Technology in Energy Tony Court Director, Cisco Consulting Services Oct 2014 3 R s for Utility Success in 21 st Century
More informationSmart Home and the Aging User - Trends and Analyses of Consumer Behavior Dr. Sibylle Meyer & Dr. Eva Schulze Berlin Institute for Social Research
Smart Home and the Aging User - Trends and Analyses of Consumer Behavior Dr. Sibylle Meyer & Dr. Eva Schulze Berlin Institute for Social Research Symposium Domotics and Networking, Miami, 11/19-12/02 1
More informationMICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY
MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY F. Shawki 1,2, M. El-Shahat. Dessouki 1,3, A. I. Elbasiouny 4, A.N. Almazroui 5, F. M. R. Albeladi 5 1 Assistant Professor, Electrical
More informationINTRODUCTION. IoT AND IP STRATEGIES
INTRODUCTION At first, the Internet of Things (IoT) may seem like an idea straight out of science fiction. However, on closer consideration, we realize that the process of connecting everyday electronic
More informationHow To Protect Your Network From Attack
NextGen SCADA security Erwin Kooi Setting the stage This talk is not An introduction to SCADA security AIC versus CIA The latest blinky-lights SCADA security appliance How to use IT security in OT envrionments
More informationSanjeev Kumar. contribute
RESEARCH ISSUES IN DATAA MINING Sanjeev Kumar I.A.S.R.I., Library Avenue, Pusa, New Delhi-110012 sanjeevk@iasri.res.in 1. Introduction The field of data mining and knowledgee discovery is emerging as a
More informationMethods for Assessing Vulnerability of Critical Infrastructure
March 2010 Methods for Assessing Vulnerability of Critical Infrastructure Project Leads Eric Solano, PhD, PE, RTI International Statement of Problem Several events in the recent past, including the attacks
More informationSophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0
Sophos XG Firewall v 15.01.0 Release Notes Sophos XG Firewall Reports Guide v15.01.0 For Sophos and Cyberoam Customers Document Date: November 2015 Contents 2 Contents Reports... 4 Basics...4 Reports Navigation...
More informationHow To Understand The Power Of The Internet Of Things
Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,
More informationSEACW DELIVERABLE D.1.6
SEACW DELIVERABLE D.1.6 Validation Methodology Specifications Project Acronym SEACW Grant Agreement No. 325146 Project Title Deliverable Reference Number Deliverable Title Social Ecosystem for Antiaging,
More informationCyberspace Situational Awarness in National Security System
Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl
More informationImplementing Deep-Secure guards in NATO Information Exchange Gateways
Briefing Paper Implementing Deep-Secure guards in NATO Information Exchange Gateways March 2014 NATO Information Exchange Gateways An Information Exchange Gateway (IEG) is a system designed to enable the
More informationEuropean Network for Cyber Security
European Network for Cyber Security Cyber Security: a fundamental basis for Smart Grids Project Summary December 19, 2014 Introduction Smart grids are crucial to support the use of more sustainable energy
More informationTUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
More informationInformation Management course
Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli (alberto.ceselli@unimi.it)
More informationGE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems
GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used
More information2014 Voluntary Page and Overlength Article Charges
2014 and NOTE: page charges do not apply to open access articles. Title Aerospace & Electronic $200 10 4 Aerospace & Electronic Affective Computing Annals of the History of Computing Antennas & Propagation
More informationVOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev
International Journal "Information Technologies and Knowledge" Vol.2 / 28 181 VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov,
More informationEL Program: Smart Manufacturing Systems Design and Analysis
EL Program: Smart Manufacturing Systems Design and Analysis Program Manager: Dr. Sudarsan Rachuri Associate Program Manager: K C Morris Strategic Goal: Smart Manufacturing, Construction, and Cyber-Physical
More informationCyber Security Incident Reporting Scheme
OCIO/G4.12a ISMF Guideline 12a Cyber Security Incident Reporting Scheme BACKGROUND Reporting cyber security incidents is a source of intelligence information that assists in the development of a greater
More informationHPC Infrastructure Development in Bulgaria
HPC Infrastructure Development in Bulgaria Svetozar Margenov margenov@parallel.bas.bg Institute of Information and Communication Technologies, Bulgarian Academy of Sciences, Acad. G. Bonchev Str. Bl. 25-A,
More informationU.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview
U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014 Cyber Security Collaborative Research Alliance A Collaborative Venture
More informationWALL TABLET. Smart Home Controller. make your home smart. Control your home from anywhere in the world
WALL TABLET W I T H WA L L C H A R G I N G S TAT I O N Smart Home Controller Control your home from anywhere in the world WALL TABLET Connect everything Makes every home safe, comfortable and energy efficient
More informationSCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
More informationAffordable Building Automation System Enabled by the Internet of Things (IoT)
Solution Blueprint Internet of Things (IoT) Affordable Building Automation System Enabled by the Internet of Things (IoT) HCL Technologies* uses an Intel-based intelligent gateway to deliver a powerful,
More information1 Log visualization at CNES (Part II)
1 Log visualization at CNES (Part II) 1.1 Background For almost 2 years now, CNES has set up a team dedicated to "log analysis". Its role is multiple: This team is responsible for analyzing the logs after
More informationA Cost-efficient Building Automation Security Testbed for Educational Purposes
A Cost-efficient Building Automation Security Testbed for Educational Purposes Jaspreet Kaur, Michael Meier, Sebastian Szlósarczyk and Steffen Wendzel Cyber Security Department Fraunhofer Institute for
More informationA Short Introduction on Data Visualization. Guoning Chen
A Short Introduction on Data Visualization Guoning Chen Data is generated everywhere and everyday Age of Big Data Data in ever increasing sizes need an effective way to understand them History of Visualization
More informationBig Data and utility function in bank services. Nikolay K. Vitanov 1
Big Data and utility function in bank services Selected aspects Nikolay K. Vitanov 1 1 Institute of Mechanics, Bulgarian Academy of Sciences Sofia, 16. 06. 2015 Vitanov (BAS) Big Data and utility function
More informationChapter 1 Basic Introduction to Computers. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 1 Basic Introduction to Computers Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Explain why computer literacy is vital to success in today s world Define
More informationIEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
More informationTHE DEVELOPMENT OF A WEB BASED MULTIMEDIA INFORMATION SYSTEM FOR BUILDING APPRAISAL
THE DEVELOPMENT OF A WEB BASED MULTIMEDIA INFORMATION SYSTEM FOR BUILDING APPRAISAL Dominic O' Sullivan Department of Civil & Environmental Engineering National University of Ireland, Cork. Dr. Marcus
More informationSelbo 2 an Environment for Creating Electronic Content in Software Engineering
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofia 2009 Selbo 2 an Environment for Creating Electronic Content in Software Engineering Damyan Mitev 1, Stanimir
More informationWearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec
Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec 3.58 KM 12.11 KPH 493 Calories 114 BPM WEARABLE TECH EVOLUTION AND SECURITY GRANT BROWN SECURITY STRATEGIST @thegrantbrown
More informationSecurity Visualization Past, Present, Future
Security Visualization Past, Present, Future Greg Conti West Point @cyberbgone http://dl.acm.org/citation.cfm?id=2671501 http://link.springer.com/chapter/10.1007%2f978-3-540-85933-8_11 http://images.cdn.stuff.tv/sites/stuff.tv/files/styles/big-image/public/25-best-hacker-movies-ever-the-matrix.jpg?itok=kiwtknw1
More informationDevelopment of a Service Robot System for a Remote Child Monitoring Platform
, pp.153-162 http://dx.doi.org/10.14257/ijsh.2014.8.5.14 Development of a Service Robot System for a Remote Child Monitoring Platform Taewoo Han 1 and Yong-Ho Seo 2, * 1 Department of Game and Multimedia,
More informationHow To Protect The Railway From Attack
FOCUS Security Research projects No 1 - November 2014 In its role as technical platform and forum for gathering and expressing members ideas, UIC is able to synthesise these research needs, along with
More informationIntrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department
More informationCYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD
CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects
More informationThe Internet of Things... Hype or not?
The Internet of Things... Hype or not? Filip De Maeyer Philip Leenders 2013 global revenues of USD 5.8 billion Client-centric, services-focused business 73% of Global Fortune 100 and 59% of Global Fortune
More informationFostering Incident Response and Digital Forensics Research
Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel bruce.nikkel@ubs.com September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital
More informationInformation & Communication Security (SS 15)
Information & Communication Security (SS 15) Security Engineering Dr. Jetzabel Serna-Olvera @sernaolverajm Chair of Mobile Business & Multilateral Security Goethe University Frankfurt www.m-chair.de Introduction
More informationConsiderations on Audience Measurement Procedures for Digital Signage Service
Considerations on Audience Measurement Procedures for Digital Signage Service Wook Hyun, MiYoung Huh, SeungHei Kim and ShinGak Kang Electronics and Telecommunications Research Institute Daejeon, Republic
More informationNO 1 IN SMART HOUSE AND HIGH TECH BUILDING TECHNOLOGIES
AKAM ARCHITECTS NO 1 IN SMART HOUSE AND HIGH TECH BUILDING TECHNOLOGIES SERIES OF CONFORT, SELF ESTEEM, HIGH CLASS, LUX What is a Smart House? The term smart house is used to describe a home that uses
More informationAvailable online at www.sciencedirect.com. ScienceDirect. Procedia CIRP 38 (2015 ) 3 7
Available online at www.sciencedirect.com ScienceDirect Procedia CIRP 38 (2015 ) 3 7 The Fourth International Conference on Through-life Engineering Services Industrial big data analytics and cyber-physical
More informationEnhanced Humans in Smart Cities: building e- skills for everyday life
Enhanced Humans in Smart Cities: building e- skills for everyday life Adel Ben Youssef (University of Nice Sophia- An6polis GREDEG- CNRS) Séminaire de l axe 4: Territoires, Systèmes techniques et usages
More informationInformation Visualization WS 2013/14 11 Visual Analytics
1 11.1 Definitions and Motivation Lot of research and papers in this emerging field: Visual Analytics: Scope and Challenges of Keim et al. Illuminating the path of Thomas and Cook 2 11.1 Definitions and
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
More informationOntology for Home Energy Management Domain
Ontology for Home Energy Management Domain Nazaraf Shah 1,, Kuo-Ming Chao 1, 1 Faculty of Engineering and Computing Coventry University, Coventry, UK {nazaraf.shah, k.chao}@coventry.ac.uk Abstract. This
More informationWireless Remote Monitoring System for ASTHMA Attack Detection and Classification
Department of Telecommunication Engineering Hijjawi Faculty for Engineering Technology Yarmouk University Wireless Remote Monitoring System for ASTHMA Attack Detection and Classification Prepared by Orobh
More informationTerms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks
Please cite this paper as: OECD (2012), Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks, OECD Digital Economy Papers, No. 210, OECD Publishing.
More informationInternet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com
Internet of Things (IoT): Security Awareness Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com So What is the Internet of Things Network of physical objects embedded with: Electronics, software, sensors
More informationGood morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data.
Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data. 1 Advances in information technologies are transforming the fabric of our society and data represent
More informationSocial Innovation through Utilization of Big Data
Social Innovation through Utilization of Big Data Hitachi Review Vol. 62 (2013), No. 7 384 Shuntaro Hitomi Keiro Muro OVERVIEW: The analysis and utilization of large amounts of actual operational data
More informationCAPABILITY FOR DEFENCE IN TURKEY
NETWORK ENABLED CAPABILITY FOR DEFENCE IN TURKEY Mr. Mete ARSLAN, marslan@ssm.gov.tr Presentation Plan Introduction of SSM SSM point of view for NEC concept and National motivation NEC Technical Feasibility
More informationDefense Technical Information Center Compilation Part Notice
UNCLASSIFIED Defense Technical Information Center Compilation Part Notice ADP012353 TITLE: Advanced 3D Visualization Web Technology and its Use in Military and Intelligence Applications DISTRIBUTION: Approved
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationPoNET kbd48cnc. User s manual
PoNET kbd48cnc User s manual Version: 16/10/2012 SAFETY INFORMATION! This product is intended for integration by the user into a computer numerical control (CNC) machine. It is the user's responsibility
More informationSystem integration oriented data center. planning. In terms of ATEN's eco Sensors DCIM solution
System integration oriented data center planning In terms of ATEN's eco Sensors DCIM solution 1. Introduction The reliability of an enterprise data center servicing either external or internal clients
More informationCyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC)
Cyber Security Design Methodology for Nuclear Power Control & Protection Systems By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC) 1. INTRODUCTION In today s world, cyber security is one
More informationGovernance van Mobiele Service Platforms
Governance van Mobiele Service Platforms Trends en ontwikkelingen Dr. ir. Mark de Reuver Section Information and Communication Technology Faculty Technology Policy and Management Delft University of Technology
More informationActive Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010
1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue
More informationAnnex 5. Training needs analysis of trainers and teachers from the vocational education sector
Annex 5 Training needs analysis of trainers and teachers from the vocational education sector Introduction In order to apply the adapted model for training trainers and teachers working in the vocational
More informationDistributing Interaction in Responsive Cross-Device Applications
Distributing Interaction in Responsive Cross-Device Applications Félix Albertos-Marco, Víctor M.R. Penichet, and José A. Gallud University of Castilla-La Mancha, Computer System Department Albacete, Spain
More informationICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE
OVERVIEW Critial infrastructures are increasingly dependent on information and communication technology. ICT-systems are getting more and more complex, and to enable the implementation of secure applications
More informationInternet of Things: IoT Day Special Edition
Table of Contents Executive Summary..1 Introduction...2 Stack Layers in Internet of Things...4 Trends..5 Assignee-wise technology distribution. 8 Appendix...9 Executive Summary Internet of Things (IoT)
More informationComputer Concepts And Applications CIS-107-TE. TECEP Test Description
Computer Concepts And Applications CIS-107-TE This TECEP tests content covered in a one-semester course in computer concepts and applications. It focuses on an overview of computers, including historical
More informationThe Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
More informationThales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg
Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg Challenges of Future Internet Internet as a starting point Was defined for asynchronous services (web pages, file transfer
More informationLong Term Research Agenda
Long Term Research Agenda Abstract This report is part of the CIRENE project that aims the definition future work including FP7 project proposal, research topics for MSc and PhD students, and the possibilities
More informationENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION
ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851
More informationCourse Overview and Outline
Course Overview and Outline The My Digital Life curriculum is comprised of seven modules that cover key concepts for building digital literacy. Each module contains between three and nine brief activities
More informationAndroid Application for Accessing KNX Devices via IP Connection
Android Application for Accessing KNX Devices via IP Connection J. A. Nazabal, J. Gómez, F. Falcone, C. Fernández-Valdivielso, P. E. Branchi and I. R. Matías Electrical and Electronic Engineering Department,
More informationFuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques
Fuzzy ognitive Map for Software Testing Using Artificial Intelligence Techniques Deane Larkman 1, Masoud Mohammadian 1, Bala Balachandran 1, Ric Jentzsch 2 1 Faculty of Information Science and Engineering,
More informationInformation Systems and Electronic Communications in Logistics Management
Information Systems and Electronic Communications in Logistics Management Ephrem Eyob, Virginia State University, Petersburg, VA 23806 eeyob@vsu.edu ABSTRACT Telecommunications and Networking Technologies
More informationDevelopment of Information System for Evaluation of Risk and Readiness of Cyber Security
Development of Information System for Evaluation of Risk and Readiness of Cyber Security Wiparat Pathakkhinang Siam Technology College, Thailand wiparatkataa@yahoo.com Assoc. Prof. Dr. Prasong Praneetpolgrang
More information